[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 3/4] xen/arm: introduce XENMEM_cache_flush
Hi Stefano, On 10/02/2014 11:02 AM, Stefano Stabellini wrote: > Introduce a new hypercall to perform cache maintenance operation on > behalf of the guest. The argument is a machine address and a size. The > implementation checks that the memory range is owned by the guest or the > guest has been granted access to it by another domain. > > Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> > --- > xen/arch/arm/mm.c | 92 > +++++++++++++++++++++++++++++++++++++++++++ > xen/include/public/memory.h | 17 ++++++++ > 2 files changed, 109 insertions(+) > > diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c > index c5b48ef..f6139bd 100644 > --- a/xen/arch/arm/mm.c > +++ b/xen/arch/arm/mm.c > @@ -1134,6 +1134,98 @@ long arch_memory_op(int op, > XEN_GUEST_HANDLE_PARAM(void) arg) > case XENMEM_get_sharing_shared_pages: > case XENMEM_get_sharing_freed_pages: > return 0; > + case XENMEM_cache_flush: > + { > + struct xen_cache_flush cflush; > + struct domain *d, *owner; > + struct page_info *page; > + uint64_t mfn, end; > + uint64_t offset, size; > + void *v; > + int ret = 0; > + > + if ( copy_from_guest(&cflush, arg, 1) ) > + return -EFAULT; > + > + d = rcu_lock_current_domain(); > + if ( d == NULL ) > + return -ESRCH; > + > + if ( (cflush.size >> PAGE_SHIFT) > (1U<<MAX_ORDER) ) > + { > + printk(XENLOG_G_ERR "invalid size %llx\n", cflush.size); This hypercall is only used with the current domain. So I would replace all printk by gdprintk. > + ret = -EINVAL; > + goto out; > + } > + > + if ( cflush.size == 0 || cflush.op == 0 ) > + { > + ret = 0; > + goto out; > + } > + > + if ( cflush.op & ~(XENMEM_CACHE_INVAL|XENMEM_CACHE_CLEAN) ) > + { > + printk(XENLOG_G_ERR "invalid op %x\n", cflush.op); > + ret = -EINVAL; > + goto out; > + } > + > + end = cflush.addr + cflush.size; > + while ( cflush.addr < end ) > + { > + mfn = cflush.addr >> PAGE_SHIFT; > + offset = cflush.addr & ~PAGE_MASK; > + > + if ( !mfn_valid(mfn) ) > + { > + printk(XENLOG_G_ERR "mfn=%llx is not valid\n", mfn); > + ret = -EINVAL; > + goto out; > + } > + > + page = mfn_to_page(mfn); > + if ( !page ) > + { > + printk(XENLOG_G_ERR "couldn't get page for mfn %llx\n", mfn); > + ret = -EFAULT; > + goto out; > + } This check is not necessary as mfn_to_page will never return NULL. > + > + owner = page_get_owner(page); Don't you need to take a reference on the page? The foreign guest may decide to drop the mapping while Xen is using it to clean. I think this could invalidate the owner pointer (for instance when a guest that is crashing). I'm also wondering if we need to take a reference on the foreign domain... [..] > diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h > index db961ec..4a6641d 100644 > --- a/xen/include/public/memory.h > +++ b/xen/include/public/memory.h > @@ -571,6 +571,23 @@ DEFINE_XEN_GUEST_HANDLE(vnuma_topology_info_t); > */ > #define XENMEM_get_vnumainfo 26 > > +/* > + * Issue one or more cache maintenance operations on a memory range > + * owned by the calling domain or granted to the calling domain by a > + * foreign domain. > + */ > +#define XENMEM_cache_flush 27 > +struct xen_cache_flush { > + /* addr is the machine address at the start of the memory range */ > + uint64_t addr; > + uint64_t size; > +#define XENMEM_CACHE_CLEAN (1<<0) > +#define XENMEM_CACHE_INVAL (1<<1) > + uint32_t op; > +}; > +typedef struct xen_cache_flush xen_cache_flush_t; > +DEFINE_XEN_GUEST_HANDLE(xen_cache_flush_t); > + > #endif /* defined(__XEN__) || defined(__XEN_TOOLS__) */ > > /* Next available subop number is 27 */ You forgot to update the comment. Regards, -- Julien Grall _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |